Just some lists of Malware Configs
☆173Jan 9, 2025Updated last year
Alternatives and similar repositories for MalwareConfigLists
Users that are interested in MalwareConfigLists are comparing it to the libraries listed below
Sorting:
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆512Oct 7, 2024Updated last year
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year
- Automatically created C2 Feeds☆666Updated this week
- Indicators of compromise☆17Jan 29, 2026Updated last month
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆313Nov 4, 2025Updated 4 months ago
- ☆96May 5, 2025Updated 10 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- ☆17Jun 14, 2023Updated 2 years ago
- ☆105Jul 11, 2024Updated last year
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Signatures and IoCs from public Volexity blog posts.☆364Dec 4, 2025Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆73Jan 6, 2026Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆641Aug 4, 2025Updated 7 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆253Oct 29, 2025Updated 4 months ago
- ☆138Apr 20, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,915Feb 24, 2026Updated last week
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago